Discussion

 

Discussion: Implementing Processes and Procedures

This chapter discussed the technologies, processes and procedures that cybersecurity specialists use to defend the systems, devices, and data that make up the network infrastructure. Review the chapter and in your initial post, describe at least three different processes and procedures you can implement on your computer. Explain how each one will protect the network infrastructure.

Initial posts are due by Wednesday at 11:59 PM CT. Your two peer responses are due by Sunday at 11:59 PM CT.

Exp19_Excel_Ch08_ML1_Portfolio_Analysis

  

Exp19_Excel_Ch08_ML1_Portfolio_Analysis

  

Exp19_Excel_Ch08_ML1_Portfolio_Analysis

Project Description:

You are a financial advisor, and a client would like you to complete an analysis of his portfolio. As part of the analysis you will calculate basic descriptive statistics with the Analysis ToolPak, calculate standard devi-ation and variance in value, calculate correlation between asset age and value, and create a stock forecast sheet.

network security layers

 there are alternatives to passwords. Passwords are considered by many to be insecure and easy to break. So what are the alternative and how are they better?

For this discussion you will research alternative to traditional password that are created by users. Choose an article and summarize your chosen alternative method of authentication. Do you think it is a possible alternative? How difficult is it to implement and manage? Is special hardware needed to use it? Does it have its own weaknesses?  These are some of the topics you should be thinking about when you write 

as below

 

The research project is a research-based paper on a current topic in the area of Cyberlaw, to be approved by your instructor. You will develop your research project in stages throughout the course, including selecting a topic, submitting an abstract/outline for instructor review and feedback, and submitting your final project paper for evaluation in Module 7.

In this deliverable, you will provide information on the topic of your chose

You have already chosen a topic for your research paper. You will now give an outline of what your paper will be about.

Provide the following for this assignment:

  • Choose a topic for your research paper, a one – two page justification of the topic. You have to answer the question – why is this topic important?
  • The general structure or outline of your proposed paper.
  • Provide 2-3 references in APA style.

Your instructor will provide feedback. The final paper is due in Module 7.

Requirements: 2 pages

Exp19_Access_Ch4_Cap – Farm Conference 1.0

     

Start Access. Open the downloaded   Access file named Exp19_Access_Ch4_Cap_Farm.accdb. Grader has automatically added your last name to the   beginning of the filename. Save the file to the location where you are   storing your files.

 

Create   a form using the Form tool based on the Presenters table. Change the title in   the Form Header to Enter/Edit Presenters.

 

Reduce   the field value control widths to approximately half their original size (to   approximately 3.6″). Delete   the subform.

 

Sort   the records by LastName in   ascending order. Save the form as Edit Presenters.   Close the form.

 

Open   the Location Information form in Layout view. Apply the Stacked Layout   control to the form. Save and close the form.

 

Create   a new report based on the Exhibits   with Presenters query using the Report Wizard. Select all available   fields, choose to view the data by Presenters, ensure that FirstName,   LastName is the only grouping level, use Date as the primary sort field in   ascending order, accept the default Stepped option, and change the layout to Landscape. Save the report as Presenter Schedule.

 

Apply   the Integral theme to this report only. Save the report.

 

Modify   the Presenter Schedule report so that the StartingTime field from the Exhibits table is added as the last   field (appearing to the right of LocationID). In Design view, ensure that the   left edge of the field is at the 8.5-inch mark on the ruler, and then return   to Layout view.

 

Change   the title of the Presenter Schedule report to Schedule by   Presenter.

 

Change   the sort so the StartingTime is a   secondary sort field (that is, so that the first sort is Date, and the second   sort is StartingTime). Save and close the report.

 

Create a new labels report based on the Presenters table. Use the Avery USA 8660   label template. Accept the default font options, and set the labels up so the first and last name appear on the top line, the Address on the second line,   and the City, State, and ZipCode appear on the final line. Your first label   should look like this:
 

Shannon Beck
368 Graham Avenue
Graham, KY 42344
 

  Do not add any sorting. Name the report Presenter Mailing   Labels.   Close the labels.

Story Telling

 Review  Discussion: Storytelling and Success Stories then focus on Moritz’s work on the  OECD Better life index download the executive summary and the index data.

In a one-page summary, note a few particular places around the world and compare and contrast the statistics.  Also, note briefly how this graphic tells the story.

https://www.visualisingdata.com/2013/04/discussion-storytelling-and-success-stories/
https://www.oecdbetterlifeindex.org/#/11111111111

Lists Test

Given numsList: 79, 45, 60, 32, 55, 24. In this doubly-linked list, the operation that will insert the 5 node after position 2 is ?

The ListTraverseReverse operation can only be used with doubly-linked lists.

  1. True
  2. False

In a singly-linked list, what is the behavior of Prepend if the list is not empty?

  1. Nothing is prepended.
  2. The algorithm points the new node’s next pointer to the head node, and then points the list’s head pointer to the new node.
  3. The algorithm points the list’s head and tail pointers to the new node.

A singly-linked list is a data structure where:

  1. The last node is referred to as the tail.
  2. Each node has a pointer to the previous node.
  3. Each node has a pointer to the next node.
  4. Each node has data.
  5. The first node is referred to as the head.

In singly-linked list, RemoveAfter() can be used because singly-linked lists only have a pointer to the next node.

  1. True
  2. False

Insertion sort can be used in both doubly-linked lists and singly-linked lists.

  1. True
  2. False

The term null is defined a special value indicating a pointer points to nothing.

  1. True
  2. False

Given numsList: 55, 12, 74, 21, 83, 30, 92. In this doubly-linked list, the Remove operation that will remove the node in position 4 is

Which operations will resize the list’s array?

  1. Remove-at
  2. Append
  3. Search
  4. InsertAfter
  5. Prepend

In a singly-linked list, append is the operation of inserting a new node within the singly linked list.

  1. True
  2. False

Exp19_Access_Ch07_CapAssessment – Loan Payments 1.0

  

Exp19_Access_Ch07_CapAssessment – Loan Payments 1.0

  

Project Description:

A lending firm asked you to assist them in updating the database they are using to keep track of their loans. The department requires a form that can be used to find information but not change information. In addition, you will enhance an existing form and generate a report showing which customers have each type loan.

modeule 7

 600 words

In order to find the best design for your documents or site it is important that you have a firm grasp on what your goals are for any piece of writing. Do you want to entertain, to sell, to perform a task, or to teach? You must also keep your rhetorical strategy in mind as you consider document design. Are you planning to focus mainly on logos, pathos, or ethos? Perhaps you are trying to balance all three. What is the age and demographic of your target audience? What are their needs in relation to the document? Do they have a disability? Do they come from a different culture?

Select a technology oriented site (examples: Apple, Amazon, Intel) and review the site in the light of the design principles